{"id":18749,"date":"2021-09-24T12:13:08","date_gmt":"2021-09-24T12:13:08","guid":{"rendered":"https:\/\/easydmarc.com\/blog\/?p=18749"},"modified":"2025-05-08T21:27:10","modified_gmt":"2025-05-08T21:27:10","slug":"what-is-a-watering-hole-attack-module-5","status":"publish","type":"post","link":"https:\/\/easydmarc.com\/blog\/what-is-a-watering-hole-attack-module-5\/","title":{"rendered":"What is A \u201cWatering Hole\u201d Attack: Module 5"},"content":{"rendered":"<p><span style=\"font-weight: 400;\">This cybersecurity term is analogous to a predator and the method in which they target their prey. The predator has an easier target when their unsuspecting victim is in a well known and frequently visited spot, where the prey\u2019s guard is down, aka the \u201cwatering hole\u201d.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Whether it\u2019s targeting an existing website or a new one, a cybercriminal is looking for a larger audience of potential victims that share an interest in the website. While <a href=\"https:\/\/easydmarc.com\/blog\/how-to-spot-the-top-5-social-engineering-attacks\/\">spear phishing<\/a> targets one individual, this is a higher-impact method, as it traps more victims.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The main methods of carrying out a <\/span>watering hole attack<span style=\"font-weight: 400;\"> are the following:<\/span><\/p>\n<ol>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Acquire the victim\u2019s username and password combinations in hopes they reuse them<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Gain access to the victim\u2019s business computer and further infect the network<\/span><\/li>\n<\/ol>\n<h2><b>How Does It Work?<\/b><\/h2>\n<p><b>Watering hole attacks<\/b><span style=\"font-weight: 400;\"> need planning, as the hacker needs to make a set of actions to achieve results. Here\u2019s how it works:<\/span><\/p>\n<ol>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">The cyberattackers define their targets by business type, company name, job title, etc.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">They find out what sites their targets visit the most<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">The threat actor creates a look-alike website or tries to infect the existing one<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">When the user visits the site, malicious code is loaded\u00a0 on their system<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">The cybercriminal uses the dropped malware to initiate the attack<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">As the attacker has access to the victim\u2019s network, they can now launch a pivot attack to achieve other goals.<\/span><\/li>\n<\/ol>\n<h2><b>How to Prevent a Watering Hole Attack?<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">While spear phishing is more targeted, <\/span>watering holes<span style=\"font-weight: 400;\"> can cause more damage. Therefore, protecting the company and individual employees should be a priority. Here are a few steps you can take to stay on top of cybersecurity threats.<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Update your software.<\/b><span style=\"font-weight: 400;\"> The older your software, the more vulnerable it is to attacks, as hackers had more time to study them better. Security and system updates will ensure strong defense against application and browser-based attacks.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Follow company policies on web navigation. <\/b><span style=\"font-weight: 400;\">Using business devices in personal communication could open the door to information loss. Also, don\u2019t click on advertisements from a company computer.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Scan internet traffic and use <a href=\"https:\/\/www.techtarget.com\/whatis\/definition\/weblog\" target=\"_blank\" rel=\"noopener\">weblogging<\/a>.<\/b><span style=\"font-weight: 400;\"> This step will ensure there\u2019s no unusual activity in the system.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Follow password security best practices.<\/b><span style=\"font-weight: 400;\"> Whether you\u2019re using a password manager or another method to remember your login details, never repeat passwords on various platforms. It heightens the risk of a <\/span><b>tailgating attack<\/b><span style=\"font-weight: 400;\">.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Pay attention to unusual behavior.<\/b><span style=\"font-weight: 400;\"> If you notice any abnormal activity on the website, let the key personnel know.<\/span><\/li>\n<\/ul>\n<h2><b>Parting Thoughts<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">This is yet another attack type that can cause significant losses for you and your company. The targeted nature of a <\/span>watering hole attack<span style=\"font-weight: 400;\"> makes it especially dangerous for larger organizations.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">If you\u2019re interested in learning more about cybersecurity, email security, and domain protection, keep an eye out for our training blogs in the future.<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>This cybersecurity term is analogous to a predator &#8230;<\/p>\n","protected":false},"author":1,"featured_media":18703,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[204,290,199],"tags":[],"class_list":["post-18749","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog","category-cyberattacks-cyberthreats","category-cybersecurity"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>What is A \u201cWatering Hole\u201d Attack: Module 5 | EasyDMARC<\/title>\n<meta name=\"description\" content=\"A watering hole attack is a form of cyber attack that has severe concequences. What is a water hole attack and how can you prevent it?\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/easydmarc.com\/blog\/what-is-a-watering-hole-attack-module-5\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"What is A \u201cWatering Hole\u201d Attack: Module 5\" \/>\n<meta property=\"og:description\" content=\"A watering hole attack is a form of cyber attack that has severe concequences. What is a water hole attack and how can you prevent it?\" \/>\n<meta property=\"og:url\" content=\"https:\/\/easydmarc.com\/blog\/what-is-a-watering-hole-attack-module-5\/\" \/>\n<meta property=\"og:site_name\" content=\"EasyDMARC\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/EasyDMARC\/\" \/>\n<meta property=\"article:published_time\" content=\"2021-09-24T12:13:08+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-05-08T21:27:10+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/easydmarc.com\/blog\/wp-content\/uploads\/2021\/09\/top-image-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1440\" \/>\n\t<meta property=\"og:image:height\" content=\"910\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"EasyDMARC\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@easydmarc\" \/>\n<meta name=\"twitter:site\" content=\"@easydmarc\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"EasyDMARC\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/what-is-a-watering-hole-attack-module-5\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/what-is-a-watering-hole-attack-module-5\\\/\"},\"author\":{\"name\":\"EasyDMARC\",\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/#\\\/schema\\\/person\\\/449261e9810b270cc697c7c9c5b89e97\"},\"headline\":\"What is A \u201cWatering Hole\u201d Attack: Module 5\",\"datePublished\":\"2021-09-24T12:13:08+00:00\",\"dateModified\":\"2025-05-08T21:27:10+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/what-is-a-watering-hole-attack-module-5\\\/\"},\"wordCount\":485,\"publisher\":{\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/what-is-a-watering-hole-attack-module-5\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/09\\\/top-image-1.jpg\",\"articleSection\":[\"Blog\",\"Cyberattacks and Cyberthreats\",\"Cybersecurity\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/easydmarc.com\\\/blog\\\/what-is-a-watering-hole-attack-module-5\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/what-is-a-watering-hole-attack-module-5\\\/\",\"url\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/what-is-a-watering-hole-attack-module-5\\\/\",\"name\":\"What is A \u201cWatering Hole\u201d Attack: Module 5 | EasyDMARC\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/what-is-a-watering-hole-attack-module-5\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/what-is-a-watering-hole-attack-module-5\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/09\\\/top-image-1.jpg\",\"datePublished\":\"2021-09-24T12:13:08+00:00\",\"dateModified\":\"2025-05-08T21:27:10+00:00\",\"description\":\"A watering hole attack is a form of cyber attack that has severe concequences. What is a water hole attack and how can you prevent it?\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/what-is-a-watering-hole-attack-module-5\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/easydmarc.com\\\/blog\\\/what-is-a-watering-hole-attack-module-5\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/what-is-a-watering-hole-attack-module-5\\\/#primaryimage\",\"url\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/09\\\/top-image-1.jpg\",\"contentUrl\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/09\\\/top-image-1.jpg\",\"width\":1440,\"height\":910,\"caption\":\"top image 1\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/what-is-a-watering-hole-attack-module-5\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/easydmarc.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Blog\",\"item\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/category\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Cybersecurity\",\"item\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/category\\\/blog\\\/cybersecurity\\\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"Cyberattacks and Cyberthreats\",\"item\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/category\\\/blog\\\/cybersecurity\\\/cyberattacks-cyberthreats\\\/\"},{\"@type\":\"ListItem\",\"position\":5,\"name\":\"What is A \u201cWatering Hole\u201d Attack: Module 5\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/\",\"name\":\"EasyDMARC\",\"description\":\"Blog\",\"publisher\":{\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/easydmarc.com\\\/#organization\",\"name\":\"EasyDMARC\",\"url\":\"https:\\\/\\\/easydmarc.com\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"url\":\"https:\\\/\\\/easydmarc.com\\\/img\\\/logo.png\"},\"image\":{\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/EasyDMARC\\\/\",\"https:\\\/\\\/x.com\\\/easydmarc\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/easydmarc\\\/mycompany\\\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/#\\\/schema\\\/person\\\/449261e9810b270cc697c7c9c5b89e97\",\"name\":\"EasyDMARC\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/fcbf1ca829f8e0977fce524da20caa8a528368d0909ce48741526046e5113259?s=96&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/fcbf1ca829f8e0977fce524da20caa8a528368d0909ce48741526046e5113259?s=96&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/fcbf1ca829f8e0977fce524da20caa8a528368d0909ce48741526046e5113259?s=96&r=g\",\"caption\":\"EasyDMARC\"},\"url\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/author\\\/easydmarc\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"What is A \u201cWatering Hole\u201d Attack: Module 5 | EasyDMARC","description":"A watering hole attack is a form of cyber attack that has severe concequences. What is a water hole attack and how can you prevent it?","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/easydmarc.com\/blog\/what-is-a-watering-hole-attack-module-5\/","og_locale":"en_US","og_type":"article","og_title":"What is A \u201cWatering Hole\u201d Attack: Module 5","og_description":"A watering hole attack is a form of cyber attack that has severe concequences. What is a water hole attack and how can you prevent it?","og_url":"https:\/\/easydmarc.com\/blog\/what-is-a-watering-hole-attack-module-5\/","og_site_name":"EasyDMARC","article_publisher":"https:\/\/www.facebook.com\/EasyDMARC\/","article_published_time":"2021-09-24T12:13:08+00:00","article_modified_time":"2025-05-08T21:27:10+00:00","og_image":[{"width":1440,"height":910,"url":"https:\/\/easydmarc.com\/blog\/wp-content\/uploads\/2021\/09\/top-image-1.jpg","type":"image\/jpeg"}],"author":"EasyDMARC","twitter_card":"summary_large_image","twitter_creator":"@easydmarc","twitter_site":"@easydmarc","twitter_misc":{"Written by":"EasyDMARC","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/easydmarc.com\/blog\/what-is-a-watering-hole-attack-module-5\/#article","isPartOf":{"@id":"https:\/\/easydmarc.com\/blog\/what-is-a-watering-hole-attack-module-5\/"},"author":{"name":"EasyDMARC","@id":"https:\/\/easydmarc.com\/blog\/#\/schema\/person\/449261e9810b270cc697c7c9c5b89e97"},"headline":"What is A \u201cWatering Hole\u201d Attack: Module 5","datePublished":"2021-09-24T12:13:08+00:00","dateModified":"2025-05-08T21:27:10+00:00","mainEntityOfPage":{"@id":"https:\/\/easydmarc.com\/blog\/what-is-a-watering-hole-attack-module-5\/"},"wordCount":485,"publisher":{"@id":"https:\/\/easydmarc.com\/blog\/#organization"},"image":{"@id":"https:\/\/easydmarc.com\/blog\/what-is-a-watering-hole-attack-module-5\/#primaryimage"},"thumbnailUrl":"https:\/\/easydmarc.com\/blog\/wp-content\/uploads\/2021\/09\/top-image-1.jpg","articleSection":["Blog","Cyberattacks and Cyberthreats","Cybersecurity"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/easydmarc.com\/blog\/what-is-a-watering-hole-attack-module-5\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/easydmarc.com\/blog\/what-is-a-watering-hole-attack-module-5\/","url":"https:\/\/easydmarc.com\/blog\/what-is-a-watering-hole-attack-module-5\/","name":"What is A \u201cWatering Hole\u201d Attack: Module 5 | EasyDMARC","isPartOf":{"@id":"https:\/\/easydmarc.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/easydmarc.com\/blog\/what-is-a-watering-hole-attack-module-5\/#primaryimage"},"image":{"@id":"https:\/\/easydmarc.com\/blog\/what-is-a-watering-hole-attack-module-5\/#primaryimage"},"thumbnailUrl":"https:\/\/easydmarc.com\/blog\/wp-content\/uploads\/2021\/09\/top-image-1.jpg","datePublished":"2021-09-24T12:13:08+00:00","dateModified":"2025-05-08T21:27:10+00:00","description":"A watering hole attack is a form of cyber attack that has severe concequences. What is a water hole attack and how can you prevent it?","breadcrumb":{"@id":"https:\/\/easydmarc.com\/blog\/what-is-a-watering-hole-attack-module-5\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/easydmarc.com\/blog\/what-is-a-watering-hole-attack-module-5\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/easydmarc.com\/blog\/what-is-a-watering-hole-attack-module-5\/#primaryimage","url":"https:\/\/easydmarc.com\/blog\/wp-content\/uploads\/2021\/09\/top-image-1.jpg","contentUrl":"https:\/\/easydmarc.com\/blog\/wp-content\/uploads\/2021\/09\/top-image-1.jpg","width":1440,"height":910,"caption":"top image 1"},{"@type":"BreadcrumbList","@id":"https:\/\/easydmarc.com\/blog\/what-is-a-watering-hole-attack-module-5\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/easydmarc.com\/"},{"@type":"ListItem","position":2,"name":"Blog","item":"https:\/\/easydmarc.com\/blog\/category\/blog\/"},{"@type":"ListItem","position":3,"name":"Cybersecurity","item":"https:\/\/easydmarc.com\/blog\/category\/blog\/cybersecurity\/"},{"@type":"ListItem","position":4,"name":"Cyberattacks and Cyberthreats","item":"https:\/\/easydmarc.com\/blog\/category\/blog\/cybersecurity\/cyberattacks-cyberthreats\/"},{"@type":"ListItem","position":5,"name":"What is A \u201cWatering Hole\u201d Attack: Module 5"}]},{"@type":"WebSite","@id":"https:\/\/easydmarc.com\/blog\/#website","url":"https:\/\/easydmarc.com\/blog\/","name":"EasyDMARC","description":"Blog","publisher":{"@id":"https:\/\/easydmarc.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/easydmarc.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/easydmarc.com\/#organization","name":"EasyDMARC","url":"https:\/\/easydmarc.com\/","logo":{"@type":"ImageObject","url":"https:\/\/easydmarc.com\/img\/logo.png"},"image":{"@id":"https:\/\/easydmarc.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/EasyDMARC\/","https:\/\/x.com\/easydmarc","https:\/\/www.linkedin.com\/company\/easydmarc\/mycompany\/"]},{"@type":"Person","@id":"https:\/\/easydmarc.com\/blog\/#\/schema\/person\/449261e9810b270cc697c7c9c5b89e97","name":"EasyDMARC","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/fcbf1ca829f8e0977fce524da20caa8a528368d0909ce48741526046e5113259?s=96&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/fcbf1ca829f8e0977fce524da20caa8a528368d0909ce48741526046e5113259?s=96&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/fcbf1ca829f8e0977fce524da20caa8a528368d0909ce48741526046e5113259?s=96&r=g","caption":"EasyDMARC"},"url":"https:\/\/easydmarc.com\/blog\/author\/easydmarc\/"}]}},"jetpack_featured_media_url":"https:\/\/easydmarc.com\/blog\/wp-content\/uploads\/2021\/09\/top-image-1.jpg","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/easydmarc.com\/blog\/wp-json\/wp\/v2\/posts\/18749","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/easydmarc.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/easydmarc.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/easydmarc.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/easydmarc.com\/blog\/wp-json\/wp\/v2\/comments?post=18749"}],"version-history":[{"count":1,"href":"https:\/\/easydmarc.com\/blog\/wp-json\/wp\/v2\/posts\/18749\/revisions"}],"predecessor-version":[{"id":47403,"href":"https:\/\/easydmarc.com\/blog\/wp-json\/wp\/v2\/posts\/18749\/revisions\/47403"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/easydmarc.com\/blog\/wp-json\/wp\/v2\/media\/18703"}],"wp:attachment":[{"href":"https:\/\/easydmarc.com\/blog\/wp-json\/wp\/v2\/media?parent=18749"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/easydmarc.com\/blog\/wp-json\/wp\/v2\/categories?post=18749"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/easydmarc.com\/blog\/wp-json\/wp\/v2\/tags?post=18749"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}